Bitwise-01 / Loki

Remote Access Tool
MIT License
572 stars 218 forks source link

Fatal error detected - Failed to execute script #7

Closed sp00kyhacker closed 5 years ago

sp00kyhacker commented 5 years ago

I am getting the error "failed to execute script stub2"

I followed exactly the directions on this video.

https://www.youtube.com/watch?v=aBEtwJ5gxSw

The file it generates is a bit bigger than the one in the video, I'm assuming as there's been some updates since then. It appears with the error but generates the second file "_stub2.exe" as an empty 0kb file that does nothing essentially. I'm on Windows 10 using python3.6

Also for my server setup I'm using a vpn IP with port forwarded, the server is started in the panel and loki.py is running fine. Just seems to be the builder, instead of 127.0.0.1 in the builder command I put my VPN server public IP and the port that is forwarded.

Thanks for taking the time to read!

Bitwise-01 commented 5 years ago

Yeah I changed something yesterday but I didn’t test the chance because I was in a rush. I will test it today and fix the errors

sp00kyhacker commented 5 years ago

Thanks brother. I'll be waiting for your reply :D I'm in no rush.

sp00kyhacker commented 5 years ago

I've tried reverting the change you made yesterday from "create_persist" back to "create_task" and I still received the same error. Hopefully this helps with debugging. I also have latest .net framework, I'm not sure if that will effect things.

Bitwise-01 commented 5 years ago

Okay. What exactly is the issue you’re getting?

On Wed, Jan 30, 2019 at 8:19 AM sp00kyhacker notifications@github.com wrote:

I've tried reverting the change you made yesterday from "create_persist" back to "create_task" and I still received the same error. Hopefully this helps with debugging. I also have latest .net framework, I'm not sure if that will effect things.

— You are receiving this because you commented.

Reply to this email directly, view it on GitHub https://github.com/Pure-L0G1C/Loki/issues/7#issuecomment-458940344, or mute the thread https://github.com/notifications/unsubscribe-auth/ATFT12IKllmlRhDPiyQ16uGKsU39UCAnks5vIZvTgaJpZM4aaHv_ .

sp00kyhacker commented 5 years ago

After waiting the delay from running the payload I generated, for testing if it connects to my server. It will appear with this error.

https://gyazo.com/3d3e009ef55c5a8faa0135d2ab256a31

The name of my executable I generated was "stub2".

sp00kyhacker commented 5 years ago

I've noticed under /build/stub2/warn-stub2.txt there is a warning for a list of 15 or so modules that are missing. I used pip3.6 to install the requirements.txt and everything went successfully, so I ran into a dead end there. Not too sure where I went wrong

Bitwise-01 commented 5 years ago

I just added support for Python 3.7, can you check if the problem went away

sp00kyhacker commented 5 years ago

Shows a lot of libraries not found while trying to build. Also when I run pip install -r requirements.txt it shows venom 425 requires certain dependencies and that they're not installed. It keeps loading new commands then automatically clears the CMD when it finishes building so I cant stop it long enough to read what libraries exactly.

sp00kyhacker commented 5 years ago

This is with using python 3.7

Bitwise-01 commented 5 years ago

Yeah, it do be like that. Pyinstaller shows a lot of libraries not found errors, just ignore it

sp00kyhacker commented 5 years ago

It worked! Thanks so much :D Im curious to know, on a separate note, what would be the correct compatibility type to use when crypting the payload? (vbc.exe, self inject, applaunch, cvtres, Manual Image Map, .net self inject) Those types are my main options

Bitwise-01 commented 5 years ago

It's pointless encrypting the payload. It will be detected when it's decrypted

sp00kyhacker commented 5 years ago

So now way to make it undetectable from AV then? Or different method?

Bitwise-01 commented 5 years ago

I mean if you don't upload it to Virus-total it should stay FUD. I'll change it once it starts getting detected

sp00kyhacker commented 5 years ago

Sounds good man. Thanks for all the help. And I use scanmybin

Bitwise-01 commented 5 years ago

No don't

Bitwise-01 commented 5 years ago

Not use any scanners

Bitwise-01 commented 5 years ago

That's like the first rule

sp00kyhacker commented 5 years ago

I havent used it to scan this stub, but I thought just to not use ones that distribute? Antiscan, Scanmybin, these ones don't distribute.

Bitwise-01 commented 5 years ago

Okay, I just just making sure.

Bitwise-01 commented 5 years ago

This program was f**king painful to write, I don't want it getting messed up

sp00kyhacker commented 5 years ago

Np I paid for subscription just for these testing purposes :D Once im home im going to test it on malwarebytes, windows defender and if it gets hit im going to try couple crypting processes and obfuscate, see if it still connects and the tasks work, hopefully.

Bitwise-01 commented 5 years ago

Alright.

Bitwise-01 commented 5 years ago

@sp00kyhacker I added encryption to the payload. Encryption is just for transfer though, nothing else